weakcredentialsPAN MASTERKEYVULNERABILITYoffice365compromisedrepositoryWindowsVulnerabilityHPMALSPAMADbruteforcegcpSmishingTenablecloudOracleERPawsIngenieriaSocialUnixVulneribilityQualysExposedadminportsvpnbruteforcePhishingAutoservicioWEB APPVULNERABILITYESXVulnerabilityWifiBruteForcedataleakweakcredentialsPAN MASTERKEYVULNERABILITYoffice365compromisedrepositoryWindowsVulnerabilityHPMALSPAMADbruteforcegcpSmishingTenablecloudOracleERPawsIngenieriaSocialUnixVulneribilityQualysExposedadminportsvpnbruteforcePhishingAutoservicioWEB APPVULNERABILITYESXVulnerabilityWifiBruteForcedataleak

Red Team - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. weak credentials
  2. PAN MASTER KEY VULNERABILITY
  3. office365
  4. compromised repository
  5. Windows Vulnerability
  6. HP
  7. MALSPAM
  8. AD brute force
  9. gcp
  10. Smishing
  11. Tenable cloud
  12. Oracle ERP
  13. aws
  14. Ingenieria Social
  15. Unix Vulneribility
  16. Qualys
  17. Exposed admin ports
  18. vpn brute force
  19. Phishing
  20. Autoservicio
  21. WEB APP VULNERABILITY
  22. ESX Vulnerability
  23. Wifi Brute Force
  24. data leak